Will NSA & CyberCom Split?

Talk of separating the National Security Agency and US Cyber Command continues to pop up, as officials discuss the best path forward for agencies with different but related missions.

The Obama administration's top defense and intelligence officials are proposing a plan to separate the spying and war fighting arms of America's vast hacking apparatus, an idea that was recommended, but rejected after the Edward Snowden revelations of 2013.

Defense Secretary Ash Carter and Director of National Intelligence James Clapper both support a proposal to separate NSA from CYBERCOM, but both declined to comment for the record.

The agencies currently share the same leader, Adm. Mike Rogers, and headquarters space at Fort Meade, Maryland. But their missions differ: NSA focuses on intelligence while CYBERCOM conducts military cyberspace operations.

“While USCYBERCOM resides with NSA, the two organizations are distinct entities with separate missions, authorities and resource streams,” said Rogers in written testimony for an April 5 Senate Armed Services Committee hearing. “Neither is an arm of the other, and both perform vital tasks on behalf of our nation.”

Adm. Mike Rogers wears two hats.

Rogers at the hearing said he supported elevating CYBERCOM to a unified combatant command, which “would allow us to be faster, which would generate better mission outcomes.” He, however, warned against taking control of CYBERCOM away from the NSA chief at this time, in part because of the command’s reliance on NSA systems.

Senior military leaders have served as NSA director since the agency’s founding in 1952. According to NBC News, future directors would be four-star generals or the equivalent, a higher rank than currently leads the agency. An earlier Reuters report said future directors could be civilians to show NSA doesn’t report to CYBERCOM.

“Following a thorough interagency review, the administration has decided that keeping the positions of NSA director and Cyber Command commander together as one, dual-hatted position is the most effective approach to accomplishing both agencies’ missions,” White House’s National Security Council spokeswoman Caitlin Hayden said.


DefenseOne:       ABC

 

« Delete Google Maps But They'll Still Track You
Uber Starts Self Driving Taxis »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Becrypt

Becrypt

Becrypt is a trusted provider of endpoint cybersecurity software solutions. We help the most security conscious organisations to protect their customer, employee and intellectual property data.

Ahope

Ahope

Ahope is a mobile security solution provider in Korea with a long history of security solution development.

Ingalls Information Security

Ingalls Information Security

Ingalls Information Security provides network security, monitoring and forensics.

macmon secure

macmon secure

macmon secure develops network security software, focussing on Network Access Control.

Anglo African

Anglo African

Anglo African is an information technology firm providing end-to-end solutions to different industries, from IT Infrastructure to DataCom as well as Cloud & InfoSec services.

Build38

Build38

Build38 provides the highest levels of security for mobile applications.

Cyscale

Cyscale

Cyscale automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

PROOF

PROOF

PROOF is a Brazilian leader in cybersecurity. Our goal is to assist our Customers in managing security efficiently and in tune with business needs.

GV (Google Ventures)

GV (Google Ventures)

GV provides venture capital funding to bold new companies in the fields of life science, healthcare, artificial intelligence, robotics, transportation, cyber security and agriculture.

Cytenna

Cytenna

Cytenna Signal is a suite of SaaS (Software-as-a-Service) products that use AI and machine learning to automatically aggregate the latest information about software vulnerabilities.

Corellium

Corellium

Corellium are dedicated to supporting our peers in the ARM community who seek to build more secure, performant, and accessible software and devices.

Cranfield University

Cranfield University

Cranfield Defence and Security are at the forefront of their fields, offering capabilities ranging from cyber security and digital warfare to robotics, forensic sciences and simulation and analytics.

Mirai Security

Mirai Security

Mirai Security are a cyber security company that specializes in Governance, Risk Management and Compliance, Cloud Security and Application Security.

ImagineX Consulting

ImagineX Consulting

ImagineX Consulting is a cybersecurity-focused boutique technology consultancy whose mission is to help our clients #BeBetter by reducing their corporate risk.

Yondu

Yondu

Yondu empowers businesses across various industries through a wide array of innovative technology solutions to help them scale in the new digital economy.

Noma Security

Noma Security

Noma Security's mission is Application Security for the Entire Data & AI Lifecycle.